First published: Sat Nov 07 2015(Updated: )
Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98, and EKI-136x devices with firmware before 1.27 have hardcoded SSH keys, which makes it easier for remote attackers to obtain access via an SSH session.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech Eki-1321 Series Firmware | <=1.96 | |
Advantech EKI-1322 Series Firmware | <=1.96 | |
Advantech Eki-1321 Series Firmware | ||
Advantech EKI-1322 Series Firmware | ||
Advantech Eki-1361 | <=1.17 | |
Advantech Eki-1362 Series Firmware | <=1.17 | |
Advantech Eki-1361 Series Firmware | ||
Advantech Eki-1362 Series Firmware | ||
Advantech Eki-122x Series Firmware | <=1.49 | |
Advantech EKI-1221D | ||
Advantech EKI-1221D | ||
Advantech EKI-1222 | ||
Advantech EKI-1222D | ||
Advantech EKI-1224 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6476 is considered a high severity vulnerability due to the presence of hardcoded SSH keys in the affected devices.
To mitigate CVE-2015-6476, upgrade the firmware of affected Advantech devices to the latest version beyond the vulnerable releases.
CVE-2015-6476 affects Advantech EKI-122x-BE devices with firmware before version 1.65, EKI-132x devices before version 1.98, and EKI-136x devices before version 1.27.
The risks of CVE-2015-6476 include unauthorized remote access to devices due to exploitable hardcoded SSH keys.
Using affected Advantech devices without addressing CVE-2015-6476 exposes the devices to significant security risks.